IT Glossary - A - ITU Online
Service Impact Notice: Due to the ongoing hurricane, our operations may be affected. Our primary concern is the safety of our team members. As a result, response times may be delayed, and live chat will be temporarily unavailable. We appreciate your understanding and patience during this time. Please feel free to email us, and we will get back to you as soon as possible.

IT Glossary
Key Terms To Know In The IT Industry

A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

Accelerometer

An accelerometer is a device that measures the acceleration forces acting on it, enabling the detection of device orientation, motion, and shocks, commonly used in smartphones, vehicles, and other electronic devices for various applications.

You will find this term commonly used in Hardware, Mobile Technology

Access Control

Access Control is a security technique that regulates who or what can view or use resources in a computing environment, encompassing authentication, authorization, and audit.

You will find this term commonly used in Security, Cybersecurity

Access Control List (ACL)

An Access Control List (ACL) is a list of permissions attached to an object in a computer system, specifying which users or system processes can access the object and what operations they can perform.

You will find this term commonly used in Security, Networking

Access Control Matrix

An Access Control Matrix is a security model that defines the rights of subjects (like users) to objects (like system resources) within a computing environment, specifying which operations are allowed for each subject-object pair.

You will find this term commonly used in Security, Cybersecurity

Access Control Systems

Systems designed to control entry to or exit from hardware, software, or physical locations, managing who or what can view or use resources in a computing environment or a building.

You will find this term commonly used in Security, IT Infrastructure

Access Management

The process and technologies used to control and monitor access to information systems, networks, and physical locations, ensuring that only authorized individuals can access resources and data.

You will find this term commonly used in Cybersecurity, IT Infrastructure

Access Point (AP)

An Access Point is a networking hardware device that allows a Wi-Fi device to connect to a wired network, serving as a bridge between Wi-Fi devices and a wired network, often used to extend the coverage area of a network.

You will find this term commonly used in Networking

Access Point Name (APN)

The name of a gateway between a mobile network and another computer network, typically the public internet.

You will find this term commonly used in Networking, Mobile Communications

Acoustic Cryptanalysis

Acoustic Cryptanalysis involves analyzing sound waves emitted by electronic devices to extract sensitive data, exploiting hardware vulnerabilities to breach security without needing direct physical or network access.

You will find this term commonly used in Security, Cybersecurity

Active Directory

Active Directory (AD) is a directory service developed by Microsoft for Windows domain networks, enabling centralized management of users, computers, and other resources within a network domain.

You will find this term commonly used in Networking, Security

Active Directory Federation Services (ADFS)

A Single Sign-On service that provides users with access to systems and applications located across organizational boundaries.

You will find this term commonly used in Networking, Security

Ad Hoc Network

An Ad Hoc Network is a temporary network connection established between devices directly without using a central router or server, typically used for specific purposes or tasks, such as file sharing or gaming among nearby devices.

You will find this term commonly used in Networking

Adaptive Bitrate Streaming

A technique used in streaming multimedia over computer networks that dynamically adjusts the quality of the video stream between the server and the client based on current network conditions to ensure uninterrupted playback.

You will find this term commonly used in Streaming Media, Network Performance

Adaptive Encryption

A form of encryption that can adjust its security parameters dynamically based on the context of the data or the security environment, enhancing data protection flexibility and efficiency.

You will find this term commonly used in Security, Cryptography

Adaptive Learning Systems

Adaptive Learning Systems use AI and real-time data to tailor educational content to the individual's learning pace, preferences, and performance, making learning more personalized and efficient.

You will find this term commonly used in AI, Education

Adaptive Security

Adaptive Security is a security approach that continuously monitors and adjusts to the changing environment and threats, aiming to anticipate and mitigate potential attacks before they occur.

You will find this term commonly used in Security, Cybersecurity

Adaptive Security Architecture

A security approach that evolves based on the behavior of users and potential threats, using real-time monitoring and automated responses to adapt to changing threat landscapes.

You will find this term commonly used in Cybersecurity, Network Security

Adaptive Security Posture

A security strategy that dynamically adapts to the changing threat landscape and the organization's IT environment, using continuous monitoring and real-time risk assessment to automatically adjust security measures and protections.

You will find this term commonly used in Cybersecurity, Risk Management

Adaptive Streaming

Adaptive Streaming is a technique used in streaming media over the internet that dynamically adjusts the quality of the video stream between the server and the client based on the available network speed, ensuring an optimal viewing experience.

You will find this term commonly used in Multimedia, Web Development

Adaptive User Interface

Adaptive User Interface (AUI) dynamically adjusts the UI and UX based on user behavior, preferences, and context, aiming to improve user satisfaction and efficiency by providing a personalized interaction experience.

You will find this term commonly used in UI/UX Design, Software Development

Adaptive Web Design

A design approach that aims to create web pages that automatically adjust and optimize themselves for the best viewing experience across different devices and screen sizes.

You will find this term commonly used in Web Development, UI/UX Design

Address Resolution Protocol (ARP)

ARP is a protocol used in the Internet Protocol (IP) networking to map an IP address to a physical machine address that is recognized in the local network, facilitating communication within a network segment.

You will find this term commonly used in Networking

Address Space

The range of memory addresses that a process or system can use to access memory or other system resources, crucial for the operation of computer systems and networks.

You will find this term commonly used in Computer Science, Operating Systems

Address Space Layout Randomization (ASLR)

ASLR is a security technique that randomly arranges the address space positions of key data areas of a process, including the base of the executable and the positions of the stack, heap, and libraries, to prevent memory corruption exploits.

You will find this term commonly used in Security, Cybersecurity

Addressable TV Advertising

A method of delivering targeted advertising based on household or user profiles, allowing different ads to be shown to different segments watching the same program.

You will find this term commonly used in Digital Marketing, Multimedia

Adobe Certified Expert (ACE)

Validates expertise in Adobe's products. Adobe offers certifications for each of its products, focusing on the skills required to excel in digital media, design, and communication.

You will find this term commonly used in Graphic Design, Multimedia

Adobe Certified Instructor (ACI)

Demonstrates expertise in Adobe products and the ability to teach others how to use them.

You will find this term commonly used in Education, Multimedia

Adobe Photoshop

A raster graphics editor developed and published by Adobe Inc. for Windows and macOS.

You will find this term commonly used in General IT, Multimedia

Advanced Data Visualization

The use of sophisticated graphical techniques and tools to represent complex data sets visually, enhancing the ability to understand trends, patterns, and outliers, and to communicate findings effectively.

You will find this term commonly used in Data Analysis, Business Intelligence

Advanced Driver-Assistance Systems (ADAS)

Systems in modern vehicles that use technology to assist the driver, including features such as automatic braking, lane-keeping assistance, and adaptive cruise control, aimed at enhancing safety and driving efficiency.

You will find this term commonly used in Automotive Technology, Safety

Advanced Encryption Standard (AES)

A symmetric encryption algorithm widely used across the globe to secure data, adopted as a standard by the U.S. government.

You will find this term commonly used in Cryptography, Security

Advanced Persistent Threat (APT)

A prolonged and targeted cyberattack in which an unauthorized user gains access to a network and remains undetected for an extended period of time, often aiming to steal data or surveil activities.

You will find this term commonly used in Cybersecurity, Network Security

Advanced RISC Machine (ARM) Architecture

A family of RISC (Reduced Instruction Set Computing) architectures for computer processors, known for their low power consumption and efficiency, widely used in mobile devices, embedded systems, and increasingly in servers and desktops.

You will find this term commonly used in Computer Architecture, Hardware

Adversarial Machine Learning

A technique in machine learning which attempts to fool models through malicious input, aiming to improve the robustness of AI systems by exposing them to attacks during training.

You will find this term commonly used in AI, Cybersecurity

Affiliate Marketing

Affiliate Marketing in IT refers to the practice where a business rewards one or more affiliates for each visitor or customer brought by the affiliate's own marketing efforts, commonly used in e-commerce and online advertising.

You will find this term commonly used in Digital Marketing, E-commerce

Affinity Analysis

A data analysis technique used to uncover relationships between variables, often used in market basket analysis to understand product purchase patterns.

You will find this term commonly used in Data Analysis, Business Intelligence

Agile Business Analysis

The practice of business analysis within an agile development context, focusing on continuously collaborating with stakeholders to understand requirements, prioritize them, and deliver incrementally to maximize value.

You will find this term commonly used in Agile Methodology, Business Analysis

Agile Development Framework

A structured set of practices and principles designed to guide the agile software development process, such as Scrum or Kanban, focusing on iterative development, collaboration, and customer feedback.

You will find this term commonly used in Software Development, Agile Methodology

Agile Development Practices

Agile Development Practices refer to the methodologies and principles used in software development that promote iterative development, collaboration, and adaptability to change, including Scrum, Kanban, and Extreme Programming (XP).

You will find this term commonly used in Software Development

Agile Estimating and Planning

The process of creating agile project plans that are iterative, flexible, and closely aligned with customer needs, often involving user stories and story points to estimate effort and complexity.

You will find this term commonly used in Agile Methodologies, Project Management

Agile Methodology

Agile Methodology is a project management approach primarily used in software development, emphasizing iterative progress, collaboration, and flexibility in response to changes.

You will find this term commonly used in General IT, Development

Agile Portfolio Planning

An approach to managing and prioritizing projects and initiatives across an organization's portfolio using agile principles, focusing on adaptability, stakeholder engagement, and delivering value in alignment with strategic goals.

You will find this term commonly used in Project Management, Agile Methodology

Agile Project Governance

The application of governance principles to agile projects, ensuring that they align with business goals and comply with organizational standards and regulations.

You will find this term commonly used in Agile Methodologies, Governance

Agile Project Management

Agile Project Management is an iterative approach to managing software development projects that focuses on continuous releases and incorporating customer feedback with every iteration.

You will find this term commonly used in General IT, Development

Agile Project Portfolio Management

The application of agile principles and practices to manage a portfolio of projects, ensuring flexibility, quick adaptation to change, and alignment with strategic business goals.

You will find this term commonly used in Project Management, Agile Methodology

Agile Release Management

Agile Release Management is the process of managing the release of software in an agile development environment, focusing on the delivery of new features and updates with high frequency and flexibility, aligning development with customer needs and feedback.

You will find this term commonly used in Software Development, IT Management

Agile Requirements Engineering

The process of continuously gathering, developing, and managing requirements for software projects in an agile context, emphasizing collaboration, customer feedback, and the ability to adapt to change.

You will find this term commonly used in Agile Methodology, Software Development

Agile Retrospectives

Meetings held at the end of a development iteration in agile methodologies, where team members discuss what went well, what could be improved, and plan actions for improvement, fostering continuous process enhancement.

You will find this term commonly used in Agile Methodology, Team Collaboration

Agile Software Craftsmanship

A commitment to creating high-quality software in an agile environment, emphasizing technical excellence, good design, and sustainable development practices.

You will find this term commonly used in Software Development, Agile Methodologies

Agile Software Development

Agile Software Development is an approach to software development under which requirements and solutions evolve through the collaborative effort of self-organizing and cross-functional teams and their customer/end user.

You will find this term commonly used in General IT, Development

What's Your
Career Path?
Entry Level Information Security Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
113 Hrs 4 Min
icons8-video-camera-58
513 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Google DevOps Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
43 Hrs 22 Min
icons8-video-camera-58
479 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
IT Manager’s Survival Bundle Training Series – 10 Courses

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
174 Hrs 15 Min
icons8-video-camera-58
773 On-demand Videos

Original price was: $179.00.Current price is: $47.40.

Add To Cart
IT Project Manager Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
36 Hrs 58 Min
icons8-video-camera-58
151 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Web Designer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
34 Hrs 37 Min
icons8-video-camera-58
172 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
ICD 9, ICD 10, ICD 11 : Medical Coding Specialist Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
37 Hrs 56 Min
icons8-video-camera-58
193 On-demand Videos

Original price was: $99.00.Current price is: $29.00.

Add To Cart
Data Analyst Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
56 Hrs 45 Min
icons8-video-camera-58
358 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Cisco Network Engineer Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
129 Hrs 56 Min
icons8-video-camera-58
473 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AZ-104 Learning Path : Become an Azure Administrator

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
109 Hrs 6 Min
icons8-video-camera-58
433 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Network Administrator Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
162 Hrs 25 Min
icons8-video-camera-58
524 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
Pentester Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
100 Hrs 16 Min
icons8-video-camera-58
430 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart
AWS Cloud Practitioner Career Path

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Total Hours
62 Hrs 56 Min
icons8-video-camera-58
475 On-demand Videos

Original price was: $129.00.Current price is: $51.60.

Add To Cart

today Only: here's $100.00 Off

Go LIFETIME at our lowest lifetime price ever.  Buy IT Training once and never have to pay again.  All new and updated content added for life.  

Learn CompTIA, Cisco, Microsoft, AI, Project Management & More...

Simply add to cart to get your Extra $100.00 off today!